Configuration Manager gives users access to business applications on a wide array of platforms. In this session we provide a deep technical overview of the application model and demonstrate how an IT Admin configures applications for a variety of devices. This session includes Windows 8 app delivery to Windows 8 and 8.1, Microsoft Application Virtualization (App-V), Mac, Linux, Windows RT, Windows Phone 8, iOS, and Android inclusive of new functionality enabled by R2 and Windows Intune.
When designing cloud applications, you should take into account the fact that a failure or malfunction of any component of the system is possible. This template is called Designing for Failure. This design approach helps minimize the negative consequences of failure of any component of the internal or external system. Sometimes, it is not so simple to use the Designing for Failure template, but the Azure platform greatly facilitates this task due to the fact that some of the functions are implemented by cloud services—Azure Web Sites, Traffic Manager, CDN, RA—Geo Redundant Storage. During this session, we shall talk about how to use the functionality provided by Azure to ensure the accessibility of a website, even in the event of failure of one of the regions of the platform.
Durante questa sessione sono illustrati i diversi strumenti disponibili per Hyper-V, che ne estendono la gestione, le funzioni e le potenzialità. Verranno analizzati prodotti a pagamento ma anche prodotti gratuiti, che rendono il vostro hypervisor ancora più prestante.
The new Microsoft Rights Management services (RMS) enables customers to protect their most sensitive information. Some customers want to put this data in the cloud while retaining control over it, while some may want to keep their data on-premises due to concerns about control over their data. Microsoft RMS can work with both these scenarios, enabling them to deploy Azure RMS to work with online and on-premises servers, and allowing them to retain control over their keys and access to documents. In this session we describe how these scenarios are deployed and demonstrate how to quickly set up Azure RMS, how to enable on-premises and cloud-based SharePoint and Exchange to use the service via the connector, and how to deploy Bring your Own Key solutions to protect your root keys.